permissions 中文意思是什麼
permissions
解釋
使用權限-
File permissions and acls can be monitored and fixed
可以監控和修改文件許可權和acl 。 -
Establish permissions on the build machine
建立生成計算機權限。 -
Code - centric authorization access permissions as typed objects
以代碼為中心的授權 -
Connect to the oracle publisher with dba permissions
用dba權限連接到oracle發布服務器。 -
Each type of permission clearly defines extreme states representing either all or none of the permissions expressible within the type
每個權限類型均明確定義了極端的狀態,表示該類型中可表現的所有權限或沒有任何權限。 -
Audit server scope gdr event class occurs when a grant, revoke, or deny is issued for permissions in the server scope, such as creating a login
當為了獲取服務器范圍內的權限(例如,創建登錄名)而發出grant 、 revoke或deny時,會產生 -
Audit database scope gdr event class occurs whenever a grant, revoke, or deny is issued for a statement permission by any user in microsoft sql server for database - only actions such as granting permissions on a database
每當microsoft sql server中的用戶發出針對語句權限的grant 、 revoke或deny時(僅限於數據庫操作,例如針對某個數據庫授予權限) ,都會發生 -
The grantee effectively has all defined permissions on the securable
被授權者實際上對安全對象具有所定義的所有權限。 -
Server - principal - id of the grantor of these permissions
這些權限的授權者的服務器主體id 。 -
Database principal id of the grantor of these permissions
這些權限的授權者的數據庫主體id 。 -
For example, in earlier versions of sql server, the permissions associated with a grantor or grantee is stored in a single row as a bitmap
例如,在早期版本的sql server中,與授權者或被授權者關聯的權限作為位圖存儲在一行中。 -
Deny typically takes precedence over other permissions
Deny通常優先於其他權限。 -
Setting run time permissions on remote iis web sites
設置遠程iis網站的運行時權限 -
Grants permissions on a securable to a principal
將安全對象的權限授予主體。 -
Identity permissions help protect code from unauthorized access
從同一基類派生。 -
The typical solution is to use a directory for which the permissions don t allow unprivileged programs to add or remove files at all
典型的解決方案是使用一個目錄,使該目錄的權限根本不允許未經授權的程序添加或者刪除文件。 -
When you build an assembly, you can specify a set of permissions that the assembly requires to run
在您生成程序集時,您可以指定該程序集運行所需的一組權限。 -
Additionally, users can run permview. exe to determine the permissions an assembly requires to execute
另外,用戶可以運行permview . exe來確定程序集要求的執行權限。 -
After the user is authenticated, the report server checks for permissions that authorize access to report server content and operations
也可以將報表服務器配置為使用一組特定的憑據。 -
Any extra permission you added has two icons in the included column : the normal checkmark, which all included permissions have, and an additional icon, which looks like a balloon containing the letter " i "
您添加的任何額外權限在「包括」列中有兩個圖標:一個是正常的選中標記,所有包括的權限都有該標記;另一個是附加圖標,看上去像一個含有字母「 i 」的氣球。
分享友人